

Author: Vlachos Dimitrios Iakovou Eleftherios Papapanagiotou Konstantinos Partsch Daniel
Publisher: Inderscience Publishers
ISSN: 1741-9174
Source: International Journal of Agile Systems and Management, Vol.5, Iss.1, 2012-03, pp. : 59-81
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Improving the Vulnerability Management Process
By Merrell Samuel Stevens James
EDPACS, Vol. 38, Iss. 1, 2008-07 ,pp. :